Reconsidering big data security and privacy in cloud and mobile cloud systems

被引:35
|
作者
Tawalbeh, Lo'ai A. [1 ,2 ]
Saldamli, Gokay [2 ,3 ]
机构
[1] Jordan Univ Sci, Comp Engn Dept, Technol, Irbid 22110, Jordan
[2] Univ Calif Santa Barbara, Dept Comp Sci, Koc Lab, Santa Barbara, CA 93106 USA
[3] San Jose State Univ, Comp Engn Dept, San Jose, CA 95112 USA
关键词
Cloud computing; Networked mobile cloud system; Big data security and privacy; MODULAR DIVISION; ALGORITHM; GF(P); ARCHITECTURE;
D O I
10.1016/j.jksuci.2019.05.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Large scale distributed systems in particular cloud and mobile cloud deployments provide great services improving people's quality of life and organizational efficiency. In order to match the performance needs, cloud computing engages with the perils of peer-to-peer (P2P) computing and brings up the P2P cloud systems as an extension for federated cloud. Having a decentralized architecture built on independent nodes and resources without any specific central control and monitoring, these cloud deployments are able to handle resource provisioning at a very low cost. Hence, we see a vast amount of mobile applications and services that are ready to scale to billions of mobile devices painlessly. Among these, data driven applications are the most successful ones in terms of popularity or monetization. However, data rich applications expose other problems to consider including storage, big data processing and also the crucial task of protecting private or sensitive information. In this work, first, we go through the existing layered cloud architectures and present a solution addressing the big data storage. Secondly, we explore the use of P2P Cloud System (P2PCS) for big data processing and analytics. Thirdly, we propose an efficient hybrid mobile cloud computing model based on cloudlets concept and we apply this model to health care systems as a case study. Then, the model is simulated using Mobile Cloud Computing Simulator (MCCSIM). According to the experimental power and delay results, the hybrid cloud model performs up to 75% better when compared to the traditional cloud models. Lastly, we enhance our proposals by presenting and analyzing security and privacy countermeasures against possible attacks. (c) 2019 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:810 / 819
页数:10
相关论文
共 50 条
  • [41] Special issue on security and privacy techniques in mobile cloud computing
    Ilsun You
    Jin Li
    Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 607 - 609
  • [42] Special issue on security and privacy techniques in mobile cloud computing
    You, Ilsun
    Li, Jin
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 607 - 609
  • [43] Big Data Services Security and Security Challenges in Cloud Environment
    Alsufyani, Raed
    Jama, Khursand
    Yao, Yulin
    Ramachandran, Muthu
    Chang, Victor
    IOTBD: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND BIG DATA, 2016, : 461 - 468
  • [44] A Security-aware Data Placement Mechanism for Big Data Cloud Storage Systems
    Kang, Seungmin
    Veeravalli, Bharadwaj
    Aung, Khin Mi Mi
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 327 - 332
  • [45] Data Security and Privacy Information Challenges in Cloud Computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 512 - 514
  • [46] A Survey of Data Security and Privacy Protection in Cloud Computing
    Yuan, Zhongbing
    Liu, Xiaojun
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 647 - 651
  • [47] An Integrated Methodology for Big Data Classifiation and Security for Improving Cloud Systems Data Mobility
    Hababeh, Ismail
    Gharaibeh, Ammar
    Nofal, Samer
    Khalil, Issa
    IEEE ACCESS, 2019, 7 : 9153 - 9163
  • [48] A Security Model for the Enhancement of Data Privacy in Cloud Computing
    Sharma, Yoshita
    Gupta, Himanshu
    Khatri, Sunil Kumar
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 898 - 902
  • [49] Data Sharing Security and Privacy Preservation in Cloud Computing
    Prasad, Kadam
    Poonam, Jadhav
    Gauri, Khupase
    Thoutam, N. C.
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1070 - 1075
  • [50] TRUSTEE - Data Privacy and Cloud Security Cluster Europe
    Bieliauskaite, Justina
    Karyda, Agi
    Krenn, Stephan
    Rios, Erkuden
    Suciu, George, Jr.
    ERCIM NEWS, 2018, (114): : 37 - 37